Systems and methods for data protection

A data protection method includes identifying data indicative of a software element parameter of a software element to be protected, which may be a hash of the software element image or carrier medium image area. The method includes identifying data indicative of a medium parameter of a medium autho...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: GNANASUNDRAM, BAHEERATHAN, ESKIN, ERDAL, MANCHANAYAKE, WARUNA
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator GNANASUNDRAM, BAHEERATHAN
ESKIN, ERDAL
MANCHANAYAKE, WARUNA
description A data protection method includes identifying data indicative of a software element parameter of a software element to be protected, which may be a hash of the software element image or carrier medium image area. The method includes identifying data indicative of a medium parameter of a medium authorized to carry the software element, which may be a unique identifier embedded in a non-image area of the medium. A validation token is defined based on a predefined protocol and written to a non-image area of the medium, which token is a function of the software element parameter and medium parameter. A device for executing the software element uses the same predefined protocol to verify the token prior to allowing execution of the software element. If the software element is copied to another medium, the token is not verifiable for the copied software, thereby restricting execution of the copied software element.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_AU2011284778BB2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>AU2011284778BB2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_AU2011284778BB23</originalsourceid><addsrcrecordid>eNrjZFAPriwuSc0tVkjMS1HITS3JyE8pVkjLL1JISSxJVCgoyi9JTS7JzM_jYWBNS8wpTuWF0twMKm6uIc4euqkF-fGpxQWJyal5qSXxjqFGBoaGRhYm5uYWTk5GxkQqAwCS1ilf</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Systems and methods for data protection</title><source>esp@cenet</source><creator>GNANASUNDRAM, BAHEERATHAN ; ESKIN, ERDAL ; MANCHANAYAKE, WARUNA</creator><creatorcontrib>GNANASUNDRAM, BAHEERATHAN ; ESKIN, ERDAL ; MANCHANAYAKE, WARUNA</creatorcontrib><description>A data protection method includes identifying data indicative of a software element parameter of a software element to be protected, which may be a hash of the software element image or carrier medium image area. The method includes identifying data indicative of a medium parameter of a medium authorized to carry the software element, which may be a unique identifier embedded in a non-image area of the medium. A validation token is defined based on a predefined protocol and written to a non-image area of the medium, which token is a function of the software element parameter and medium parameter. A device for executing the software element uses the same predefined protocol to verify the token prior to allowing execution of the software element. If the software element is copied to another medium, the token is not verifiable for the copied software, thereby restricting execution of the copied software element.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2014</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20141030&amp;DB=EPODOC&amp;CC=AU&amp;NR=2011284778B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20141030&amp;DB=EPODOC&amp;CC=AU&amp;NR=2011284778B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>GNANASUNDRAM, BAHEERATHAN</creatorcontrib><creatorcontrib>ESKIN, ERDAL</creatorcontrib><creatorcontrib>MANCHANAYAKE, WARUNA</creatorcontrib><title>Systems and methods for data protection</title><description>A data protection method includes identifying data indicative of a software element parameter of a software element to be protected, which may be a hash of the software element image or carrier medium image area. The method includes identifying data indicative of a medium parameter of a medium authorized to carry the software element, which may be a unique identifier embedded in a non-image area of the medium. A validation token is defined based on a predefined protocol and written to a non-image area of the medium, which token is a function of the software element parameter and medium parameter. A device for executing the software element uses the same predefined protocol to verify the token prior to allowing execution of the software element. If the software element is copied to another medium, the token is not verifiable for the copied software, thereby restricting execution of the copied software element.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2014</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFAPriwuSc0tVkjMS1HITS3JyE8pVkjLL1JISSxJVCgoyi9JTS7JzM_jYWBNS8wpTuWF0twMKm6uIc4euqkF-fGpxQWJyal5qSXxjqFGBoaGRhYm5uYWTk5GxkQqAwCS1ilf</recordid><startdate>20141030</startdate><enddate>20141030</enddate><creator>GNANASUNDRAM, BAHEERATHAN</creator><creator>ESKIN, ERDAL</creator><creator>MANCHANAYAKE, WARUNA</creator><scope>EVB</scope></search><sort><creationdate>20141030</creationdate><title>Systems and methods for data protection</title><author>GNANASUNDRAM, BAHEERATHAN ; ESKIN, ERDAL ; MANCHANAYAKE, WARUNA</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_AU2011284778BB23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2014</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>GNANASUNDRAM, BAHEERATHAN</creatorcontrib><creatorcontrib>ESKIN, ERDAL</creatorcontrib><creatorcontrib>MANCHANAYAKE, WARUNA</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>GNANASUNDRAM, BAHEERATHAN</au><au>ESKIN, ERDAL</au><au>MANCHANAYAKE, WARUNA</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Systems and methods for data protection</title><date>2014-10-30</date><risdate>2014</risdate><abstract>A data protection method includes identifying data indicative of a software element parameter of a software element to be protected, which may be a hash of the software element image or carrier medium image area. The method includes identifying data indicative of a medium parameter of a medium authorized to carry the software element, which may be a unique identifier embedded in a non-image area of the medium. A validation token is defined based on a predefined protocol and written to a non-image area of the medium, which token is a function of the software element parameter and medium parameter. A device for executing the software element uses the same predefined protocol to verify the token prior to allowing execution of the software element. If the software element is copied to another medium, the token is not verifiable for the copied software, thereby restricting execution of the copied software element.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_AU2011284778BB2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Systems and methods for data protection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T07%3A12%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=GNANASUNDRAM,%20BAHEERATHAN&rft.date=2014-10-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EAU2011284778BB2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true